Chapter 15IoT Security

DOI: 10.1201/9781003303206-15

I am trying to consolidate some views on IoT security mechanisms, as IoT is growing fast and will touch each one of us in some time to come. Creating a secure model for the IoT requires excellent teamwork, collaboration, coordination, connectivity, and of course understanding each unit of the IoT ecosystem. All the involved devices (or one may call them sensors) and Local Border Router (LBR), etc., must work together and must communicate securely and interact seamlessly with connected systems and infrastructures. For IoT to work securely with rigorous validity checks, authentication, and data verification, the data needs to be encrypted at different levels. As an example, at the application ...

Get Design of Internet of Things now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.